pyrdp icon indicating copy to clipboard operation
pyrdp copied to clipboard

Steal only one set of hash then passthrough

Open obilodeau opened this issue 4 years ago • 0 comments

Our current NTLM capture mode is disruptive if used during a pentest because a MITM-ed client will not be able to reach the intended server at all. The type of things you need to avoid in pentests at all costs.

It would be nice if we could have knowledge about which destination server we already stolen a hash from and then enter a complete passthrough mode for these.

obilodeau avatar Nov 26 '21 21:11 obilodeau